show dhcpd binding output ASA-5585-x 8.4(1)9 - Multiple Context
Just a quick question.
We have a customer in a context and a simple DHCP configuration on the Security Context.
Everything was working ok after I moved the customer connection in question from a PIX to this Security Context. Now after changing the DSL -modem (bridged) at the customer site and changing the connection type from ADSL to VDSL customer has expirienced problems with DHCP
I can see the customer getting IP address from the Security Context normally for 5 computers. What seems strange though is that there is some very wierd looking output in the "show dhcpd binding" command.
Here is the output
sh dhcpd binding
IP address Client Identifier Lease expiration Type
When I do "show arp" for the bold/red IP address above I get the following
<interface name> 10.54.4.110 2c54.2d44.66eb 116
To my understanding the MAC address above belongs to a Cisco device and most probably a Cisco ASAS 5505 that the customers own IT-support company has attached to the network even before this problem started. I have no idea what its used for.
I have yet to do any debug related to the DHCP or havent taken any captures. What I would like to know is that does anyone know what the strange "show dhcpd binding" output is?
We will probably changing the VDSL device to an older model (as the current one is a model that our ISP has just gotten from the manufacturer) or perhaps stick a C881 router behind the bridged modem and let it do the DHCP instead of the Security Context.
Threat Response Basics
What is Threat Response and how can it help my organization?
What is the cost of Threat Response?
What are the deployment options for Threat Response?
Is Threat Response available outside of the United States?
Gartner has once again named Cisco a Leader in the Magic Quadrant for Network Firewalls. This distinction recognizes Cisco's ingenuity in redefining the firewall as the basis for an integrated security platform.
Find out how Cisco stands out from the comp...
Hi experts,I would like any suggestions on this topology. We are is the middle of replacing our old ASA5520 with the new FirePower. Our current firewall terminate our IPsec tunnels and the GRE is terminated on the first inside router's loopback on the sec...
Hi All, A customer wants to authenticate Anyconnect VPN users from an ASA using the client installed certificate and then with AD. i.e. Is this a corporate device?Would we recommend authenticating the cert on the ASA then passing the AD check to ISE ...
Hello Team, we are getting alert in FMC stating policy deployment failed, we are running on 6.2.0 version and not sure which version is stable version to re mediate this issue, in one event i have seen restart will resolve this issue but is it perman...